Port 53 is the default port for DNS, and it is a good example of why the transport protocol matters as much as the port number.
A port is a transport layer number used together with an IP address and a protocol such as TCP or UDP to direct traffic to the correct service on a host.
A server process binds a socket to a port and listens, while a client typically chooses an ephemeral source port for outbound connections.
The combination of source and destination IP addresses, source and destination ports, and the transport protocol uniquely identifies a flow so the operating system can keep many conversations separate.
Firewalls, NAT, and scanners talk about ports because the destination port is the stable rendezvous point that exposes a service to the network.
Most everyday DNS lookups use UDP 53: a client sends a small query from an ephemeral source port to the resolver on destination port 53, and the resolver replies back to that source port.
TCP 53 is also important.
It is used when a response does not fit in a single UDP message, when reliability is required, and for zone transfers between authoritative servers.
In real networks this means firewalls often need to allow both UDP and TCP 53 for resolvers and authoritative DNS, even if you only think about the quick UDP query path.
Security wise, exposed DNS can be abused for information gathering, amplification attacks if recursion is open, and as a control channel when attackers tunnel data through DNS queries.